US8253531B2 - On chip verification and consequent enablement of card OS operation in smart cards - Google Patents
On chip verification and consequent enablement of card OS operation in smart cards Download PDFInfo
- Publication number
- US8253531B2 US8253531B2 US12/411,631 US41163109A US8253531B2 US 8253531 B2 US8253531 B2 US 8253531B2 US 41163109 A US41163109 A US 41163109A US 8253531 B2 US8253531 B2 US 8253531B2
- Authority
- US
- United States
- Prior art keywords
- flag
- operating system
- smart card
- card
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related, expires
Links
- 238000012795 verification Methods 0.000 title abstract description 10
- 238000000034 method Methods 0.000 claims description 17
- 239000003990 capacitor Substances 0.000 claims description 9
- 238000004590 computer program Methods 0.000 claims description 9
- 238000012545 processing Methods 0.000 claims description 8
- 230000008901 benefit Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 230000015654 memory Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000002207 retinal effect Effects 0.000 description 1
- 230000003936 working memory Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/356—Aspects of software for card payments
- G06Q20/3563—Software being resident on card
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
- G07C9/257—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
- G07C9/26—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition using a biometric sensor integrated in the pass
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
Definitions
- the invention relates to biometric identification such as fingerprint verification. More particularly, the invention relates to a system for on chip verification and consequent enablement of card OS operation using smart cards.
- Smart cards are usually, although not necessarily, the size of a standard credit card, but contain some form of electrical circuitry, usually in the form of one or more integrated circuits (ICs).
- Simple smart cards may function only as a memory, but more complex ones include a Central Processing Unit (CPU), so as to be able to process data in various ways. This processing is often limited to controlling access to the memory in some way or other, to prevent unauthorized changes to the data stored there.
- CPU Central Processing Unit
- FIG. 4 shows a card 490 including a CPU 400 with a card operating system 410 and contacts 430 to connect to external readers and biometric sensors, for example.
- Smart cards have been used as credit cards, charge cards, and debit cards, as well as for access to mass transit and parking, to store health records, as identity badges, and for secure access to a Local Area Network (LAN), as well as in cellular phones and cable TV set-top boxes, amongst other applications.
- LAN Local Area Network
- Smart cards have been used as credit cards, charge cards, and debit cards, as well as for access to mass transit and parking, to store health records, as identity badges, and for secure access to a Local Area Network (LAN), as well as in cellular phones and cable TV set-top boxes, amongst other applications.
- biometrics such as a fingerprint
- Present identity verification schemes generally either rely upon cryptography, or rely upon biometric identity verification that does not take place on the card itself.
- G&D Giesecke & Devrient GmbH
- Fidelica Microsystems, Inc. that provide on chip finger print sensors and verification but they use a proprietary, experimental OS and not a commercial grade publicly available OS.
- a method for biometric authentication for a smart card including bootstrap loading the smart card with an input/output operating system, checking whether a flag is set, reading biometric information of a user under control of the input/output operating system to authenticate the user if the flag is not set, setting the flag if the user is authenticated according to the biometric information, and loading the smart card with a card operating system if the flag is set, the card operating system being distinct from the input/output operating system.
- the reading of the biometric information of the user comprises reading a fingerprint of the user.
- the reading of the fingerprint is performed by a fingerprint sensor integrated into the smart card.
- the reading of the biometric information of the user is performed by a sensor integrated into the smart card.
- the indication of whether the flag is set or not set may be done via a storage bit in a non-volatile random access memory, or alternatively, via a capacitor.
- the flag may be cleared after a preset time delay.
- a computer program product for biometric authentication of a smart card user including a computer readable medium, having computer readable program code embodied in the computer readable medium, the computer readable program code including instructions to bootstrap load the smart card with an input/output operating system, instructions to check whether a flag is set, instructions to read biometric information of a user under control of the input/output operating system to authenticate the user if the flag is not set, instructions to set the flag if the user is authenticated according to the biometric information, and instructions to load the smart card with a card operating system if the flag is set, the card operating system being distinct from the input/output operating system.
- a biometrically authenticated smart card including a central processing unit, a first media storing an input/output operating system to bootstrap load the smart card and control the central processing unit before a card operating system is loaded, storage for storing a flag, which is set by the central processing unit if a user is authenticated, a biometric information reader to authenticate a user under control of the input/output operating system if the flag is not set, and a second media storing a card operating system to be loaded into the smart card if the flag is set, the card operating system being distinct from the input/output operating system.
- FIG. 1 shows the architecture of a system according to a preferred embodiment of the invention.
- FIG. 2 shows functional operation of the system a according to FIG. 1 .
- FIG. 3 is a flowchart of a method of according to the invention.
- FIG. 4 shows a smart card according to the prior art.
- the proposed system is a practical implementation of a system where existing fingerprint or other biometric technology can be integrated with an existing commercial operating system without extensive modifications to the operating system.
- biometric identification capability such as fingerprint identification
- biometric reader that is not part of the smart card itself. This limits the use of such smart cards, such that biometric identification is not possible when they are used with existing smart card readers that do not incorporate biometric identification hardware.
- a smart card where a fingerprint reader or other biometric reader is integrated into the card itself.
- the biometric reader may also be, for example, a retinal scanner.
- a smart card is provided that is compatible with standard operating systems.
- the system works by having an additional software layer ‘boot’, i.e. bootstrap load itself into a working memory, prior to the commercial card operating system booting.
- This software layer, or boot loader provides the drivers and functionality for the finger print sensor and on-card matching.
- the boot loader will also be referred to as the input/output operating system, or IOS. If the cardholder is successfully authenticated, it then allows an unmodified commercial operating system to boot. Such a commercial operating system for smart cards is referred to herein as a card operating system, Card OS or COS. If the cardholder does not authenticate with the boot loader then the card does not boot the card operating system and thus cannot be used for financial transactions.
- An advantage of the invention is the use of a monolithic CPU architecture as currently exists in smart cards. A single CPU is more practical since power and physical real estate is scarce on a smart card.
- a further advantage of the invention is the use of an existing, unmodified, card operating system. Modifications to the card operating system are expensive to construct and expensive to certify.
- Yet another advantage of the invention is that it provides a secure means to use a smartcard with biometric authentication with minimal development effort.
- the present invention is directed toward a system for on chip verification and consequent enablement of operation of a card operating system (Card OS) using smart cards.
- Card OS card operating system
- FIG. 1 shows the architecture of a system according to a preferred embodiment of the invention.
- the card 190 has one CPU 100 but two different operating systems; a conventional card operating system (COS) 110 obtained from a vendor and a custom built I/O (input/output) operating system (IOS) 120 .
- COS 110 is used to perform financial transactions in the case of a credit card smart card using, communicating using known connection standards such as ISO 7816/10536/14443/15693 with a Point of Sale (POS) reader (not shown).
- COS 110 is preferably not modified, but is used in its existing form as obtained from the vendor.
- Contacts 130 comply with ISO 7816 in the exemplary embodiment shown.
- the IOS 120 is used to authenticate a user to the card using a user interface peripheral 180 , which can include an on-card fingerprint sensor, or other biometric information reader.
- the card 190 has a battery 140 and clock 150 so that it can operate independently of a card reader.
- the card 190 uses storage 160 to hold a “card holder authenticated” flag, e.g. by storing a bit indicating if the flag is set.
- Storage 160 can be, for example, a non-volatile RAM (NVRAM), or a resistor/capacitor (RC) network set via a General purpose I/O (GPIO) pin.
- NVRAM non-volatile RAM
- RC resistor/capacitor
- FIG. 2 shows functional operation of the system according to FIG. 1 .
- the IOS 120 is always booted first when power is applied. Its purpose is to check if the card 190 is in a “card holder authenticated” mode by reading the status of the flag from storage 160 . If the cardholder or user has not been authenticated, then the cardholder is prompted to authenticate using the peripheral 180 , which can include an integral finger print sensor or other biometric sensor as previously noted. If the cardholder has already authenticated, the normal card operating system is allowed to boot. If the storage 160 used to hold the flag is an NVRAM, for example, the user can authenticate and then boot the Card OS 110 much later. If the flag is kept in a resistor/capacitor network, then the authentication is allowed to time-out after a given time, i.e.
- the flag is set by charging a capacitor, but the charge leaks away via a resistor, according to the time constant RC of the network as per well-known principles.
- the flag may be cleared, that is to say reset to a not set state, after a preset period of time.
- FIG. 3 is a flowchart illustrating the method of the invention.
- step 300 the smart card boots to the IOS 120 , then in step 310 the flag in storage 160 is checked. If step 310 detects that the flag is not set, then the method proceeds to read the user's biometric information in step 320 , and in step 330 the biometric information is checked for a match. If the biometric information matches and the user is authenticated, then in step 340 the flag is set and then the method returns to step 310 , and if not the method returns directly to step 310 . If step 310 detects that the flag is set, then in step 350 the card OS is enabled to be loaded, although it may actually be loaded later, subject to a time-out time, and the flag is cleared. In step 360 , the user selects a smart card application via the reader, and in step 370 the card is removed.
- embodiments of the present invention may also be delivered as part of a service engagement with a corporation, nonprofit organization, government entity, internal organizational structure, or the like. Aspects of these embodiments may include designing, deploying, and configuring a computing system containing the systems and/or practicing the methods described herein. Further aspects of these embodiments may include analyzing the client's operations, creating recommendations responsive to the analysis, building systems that implement portions of the recommendations, integrating the systems into existing processes and infrastructure, metering use of the systems, allocating expenses to users of the systems, and billing for use of the systems.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Human Computer Interaction (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Image Input (AREA)
- Credit Cards Or The Like (AREA)
- Collating Specific Patterns (AREA)
Abstract
Description
Claims (19)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/411,631 US8253531B2 (en) | 2009-03-26 | 2009-03-26 | On chip verification and consequent enablement of card OS operation in smart cards |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/411,631 US8253531B2 (en) | 2009-03-26 | 2009-03-26 | On chip verification and consequent enablement of card OS operation in smart cards |
Publications (2)
Publication Number | Publication Date |
---|---|
US20100245037A1 US20100245037A1 (en) | 2010-09-30 |
US8253531B2 true US8253531B2 (en) | 2012-08-28 |
Family
ID=42783429
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/411,631 Expired - Fee Related US8253531B2 (en) | 2009-03-26 | 2009-03-26 | On chip verification and consequent enablement of card OS operation in smart cards |
Country Status (1)
Country | Link |
---|---|
US (1) | US8253531B2 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9607189B2 (en) | 2015-01-14 | 2017-03-28 | Tactilis Sdn Bhd | Smart card system comprising a card and a carrier |
US10037528B2 (en) | 2015-01-14 | 2018-07-31 | Tactilis Sdn Bhd | Biometric device utilizing finger sequence for authentication |
US10063541B2 (en) | 2014-12-29 | 2018-08-28 | Samsung Electronics Co., Ltd. | User authentication method and electronic device performing user authentication |
US10395227B2 (en) | 2015-01-14 | 2019-08-27 | Tactilis Pte. Limited | System and method for reconciling electronic transaction records for enhanced security |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9348633B2 (en) | 2009-07-20 | 2016-05-24 | Google Technology Holdings LLC | Multi-environment operating system |
US9367331B2 (en) | 2009-07-20 | 2016-06-14 | Google Technology Holdings LLC | Multi-environment operating system |
US9372711B2 (en) | 2009-07-20 | 2016-06-21 | Google Technology Holdings LLC | System and method for initiating a multi-environment operating system |
US9389877B2 (en) | 2009-07-20 | 2016-07-12 | Google Technology Holdings LLC | Multi-environment operating system |
US9354900B2 (en) | 2011-04-28 | 2016-05-31 | Google Technology Holdings LLC | Method and apparatus for presenting a window in a system having two operating system environments |
US20120278747A1 (en) * | 2011-04-28 | 2012-11-01 | Motorola Mobility, Inc. | Method and apparatus for user interface in a system having two operating system environments |
US20120313754A1 (en) * | 2011-06-13 | 2012-12-13 | X-Card Holdings, Llc | Biometric smart card reader |
US20130293573A1 (en) | 2012-05-02 | 2013-11-07 | Motorola Mobility, Inc. | Method and Apparatus for Displaying Active Operating System Environment Data with a Plurality of Concurrent Operating System Environments |
US9342325B2 (en) | 2012-05-17 | 2016-05-17 | Google Technology Holdings LLC | Synchronizing launch-configuration information between first and second application environments that are operable on a multi-modal device |
CN108038694B (en) * | 2017-12-11 | 2019-03-29 | 飞天诚信科技股份有限公司 | A kind of fiscard and its working method with fingerprint authentication function |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030074568A1 (en) * | 2001-10-17 | 2003-04-17 | Kinsella David J. | Methods and apparatuses for performing secure transactions without transmitting biometric information |
US20040093592A1 (en) * | 2002-11-13 | 2004-05-13 | Rao Bindu Rama | Firmware update in electronic devices employing SIM card for saving metadata information |
US20050248755A1 (en) * | 2004-05-07 | 2005-11-10 | Chung-Cheng Chou | Refresh counter with dynamic tracking of process, voltage and temperature variation for semiconductor memory |
US20060130128A1 (en) * | 2002-07-01 | 2006-06-15 | Emir Gorancic | Process for compiling and executing software applications in a multi-processor environment |
US20070279227A1 (en) * | 2006-02-03 | 2007-12-06 | Ari Juels | Authentication Methods and Apparatus Utilizing Hash Chains |
US20090050697A1 (en) * | 2007-08-24 | 2009-02-26 | Collier Sparks | Apparatus for distributed data storage of security identification and security access system and method of use thereof |
-
2009
- 2009-03-26 US US12/411,631 patent/US8253531B2/en not_active Expired - Fee Related
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030074568A1 (en) * | 2001-10-17 | 2003-04-17 | Kinsella David J. | Methods and apparatuses for performing secure transactions without transmitting biometric information |
US20060130128A1 (en) * | 2002-07-01 | 2006-06-15 | Emir Gorancic | Process for compiling and executing software applications in a multi-processor environment |
US20040093592A1 (en) * | 2002-11-13 | 2004-05-13 | Rao Bindu Rama | Firmware update in electronic devices employing SIM card for saving metadata information |
US20050248755A1 (en) * | 2004-05-07 | 2005-11-10 | Chung-Cheng Chou | Refresh counter with dynamic tracking of process, voltage and temperature variation for semiconductor memory |
US20070279227A1 (en) * | 2006-02-03 | 2007-12-06 | Ari Juels | Authentication Methods and Apparatus Utilizing Hash Chains |
US20090050697A1 (en) * | 2007-08-24 | 2009-02-26 | Collier Sparks | Apparatus for distributed data storage of security identification and security access system and method of use thereof |
Non-Patent Citations (3)
Title |
---|
"Fingerprint Cards launches first complete fingerprint verification system at less 10 USD/unit" Sep. 30, 2002; http.www.fingerprints.com/page.asp?newsID=114§ion=news. |
Mimura et al., "Fingerprint Verification System on Smart Card", IEEE, pp. 182-183, 2002. |
William Wong, "Fingerprint Sensor Integrates With Trusted Pre-Boot Authentication Systems," Oct. 26, 2006; http://electronicdesign.com/Articles/Index.cfm?AD=1&AD=1&ArticleID=13817. |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10063541B2 (en) | 2014-12-29 | 2018-08-28 | Samsung Electronics Co., Ltd. | User authentication method and electronic device performing user authentication |
US9607189B2 (en) | 2015-01-14 | 2017-03-28 | Tactilis Sdn Bhd | Smart card system comprising a card and a carrier |
US10037528B2 (en) | 2015-01-14 | 2018-07-31 | Tactilis Sdn Bhd | Biometric device utilizing finger sequence for authentication |
US10147091B2 (en) | 2015-01-14 | 2018-12-04 | Tactilis Sdn Bhd | Smart card systems and methods utilizing multiple ATR messages |
US10223555B2 (en) | 2015-01-14 | 2019-03-05 | Tactilis Pte. Limited | Smart card systems comprising a card and a carrier |
US10229408B2 (en) | 2015-01-14 | 2019-03-12 | Tactilis Pte. Limited | System and method for selectively initiating biometric authentication for enhanced security of access control transactions |
US10275768B2 (en) | 2015-01-14 | 2019-04-30 | Tactilis Pte. Limited | System and method for selectively initiating biometric authentication for enhanced security of financial transactions |
US10395227B2 (en) | 2015-01-14 | 2019-08-27 | Tactilis Pte. Limited | System and method for reconciling electronic transaction records for enhanced security |
Also Published As
Publication number | Publication date |
---|---|
US20100245037A1 (en) | 2010-09-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8253531B2 (en) | On chip verification and consequent enablement of card OS operation in smart cards | |
Shelfer et al. | Smart card evolution | |
US10970706B2 (en) | Method for processing a transaction from a communications terminal | |
US20120313754A1 (en) | Biometric smart card reader | |
US6179205B1 (en) | System and method for locking and unlocking and application in a smart card | |
RU2014138935A (en) | METHOD, DEVICE AND PROTECTED ELEMENT FOR PERFORMING A SAFE FINANCIAL TRANSACTION IN A DEVICE | |
BR112019027681A2 (en) | card biometric emulation for payment authorization in stores | |
US10354055B2 (en) | Portable electronic device and system | |
US20210201294A1 (en) | Bank card privacy information hiding method, bank card and computer readable storage medium | |
JP2003501758A (en) | Card memory device | |
EP3365833B1 (en) | A method performed by an electronic device capable of communicating with a reader with improved self-testing | |
US10915805B2 (en) | Method for recording a reference biometric data item in a biometric smart card | |
US8276188B2 (en) | Systems and methods for managing storage devices | |
US9047457B2 (en) | Portable electronic entity, host station and associated method | |
US10268944B2 (en) | Dual-interface payment device with display | |
CN113947175A (en) | Biometric authentication smart card | |
TWM504286U (en) | Security digital memory card with embedded smart chip and card reader terminal | |
EP3644202B1 (en) | Biometric-secured non-biometric applications on a card | |
KR100720374B1 (en) | Smart universal serial bus storage and soft smart card system and service support method using the same | |
EP3929779B1 (en) | Biometric authentication smart cards | |
US11195181B2 (en) | Method and device for parameterising a device for performing banking operations | |
TW201635205A (en) | Security digital memory card with embedded smart chip, card reader terminal and controlling method thereof | |
Osborne et al. | A jc-bioapi compliant smart card with biometrics for secure access control | |
Maitra | A Brief Primer on Smart Card Operating Systems | |
WO2013155040A1 (en) | Smart connect devices for the interconnectivity of data cards with computing devices to enable the performance of various functions upon authentication by a user's fingerprint and/or a user's photograph |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:DAVIS, JOHN F.;OSBORNE, SHELDON M.;REED, FREDERICK I., III;AND OTHERS;SIGNING DATES FROM 20090303 TO 20090317;REEL/FRAME:022454/0858 |
|
ZAAA | Notice of allowance and fees due |
Free format text: ORIGINAL CODE: NOA |
|
ZAAB | Notice of allowance mailed |
Free format text: ORIGINAL CODE: MN/=. |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |